Motorola, Inc. v. Lemko Corporation, Case No. 08 C 5427.

Decision Date11 February 2009
Docket NumberCase No. 08 C 5427.
CourtU.S. District Court — Northern District of Illinois
PartiesMOTOROLA, INC., Plaintiff, v. LEMKO CORPORATION, Shaowei Pan, Hanjuan Jin, Xiaohua Wu, Xuefeng Bai, and Xiaohong Sheng, Defendants.

R. Mark Halligan, Deanna R. Swits, Kathryn Kristine Wycoff, Lovells LLP, Chicago, IL, for Plaintiff.

John Michael Riccione, Amy Michelle Rapoport, William J. Serritella, Jr., Aronberg, Goldgehn, Davis & Garmisa, Telly Stefaneas, Telly Stefaneas, Esq., Robert R. Cohen, Matthew Douglas Lango, Frankel & Cohen, Thomas Howard Geoghegan, Jorge Sanchez, Michael Paul Persoon, Despres Schwartz & Geoghegan, Chicago, IL, for Defendants.

MEMORANDUM OPINION AND ORDER

MATTHEW F. KENNELLY, District Judge:

Motorola, Inc. has sued Lemko Corporation, Shaowei Pan, Hanjuan Jin, Xiaohua Wu, Xuefeng Bai, and Xiaohong Sheng for alleged violations of the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, and the Illinois Trade Secrets Act (ITSA), 765 ILCS 1065/3 & 4. Motorola has also sued Jin, Wu, Bai, and Sheng for alleged breaches of fiduciary duty. All defendants other than Jin have moved to dismiss Motorola's claims.1 For the reasons set forth below, the Court grants the motions to dismiss in part and denies them in part.

Factual Background

When considering a motion to dismiss, the Court accepts as true the complaint's factual allegations and draws reasonable inferences in favor of the plaintiff. See, e.g., Killingsworth v. HSBC Bank Nevada, N.A., 507 F.3d 614, 617 (7th Cir.2007). Unless otherwise indicated, references to the "complaint" are to Motorola's Amended Complaint.

Motorola is a global communications company. Its business includes a wide array of communication technologies and services. As part of its business, Motorola has developed a number of proprietary trade secrets as well as other confidential information. Motorola utilized various security measures to protect its trade secrets and other confidential information. The engineers it employed, including certain of the individual defendants, were required to sign confidentiality and employment agreements that restricted the disclosure and use of confidential information. Those restrictions are reflected in Motorola's internal policies.

Lemko is a privately held company with headquarters in Schaumburg, Illinois and additional offices in China and India. It competes with Motorola in the development and marketing of cellular infrastructure systems, voice and data services, and other wireless communication technologies.

Jin was employed at Motorola from 1998 until February 2007 as an engineer. Motorola claims that Jin secretly accepted employment with Lemko beginning in March 2005 and never disclosed to Motorola her simultaneous employment with Lemko. Motorola alleges that on a number of occasions, Jin, without authorization or in excess of her authorization, accessed Motorola's computers to obtain and transfer Motorola's trade secrets and other confidential information for the benefit of Lemko. Motorola provides several specific examples of this alleged conduct, including: (a) on March 24, 2005, Jin obtained from Motorola's computers, and transferred by e-mail to her own personal, non-secure e-mail account, Motorola's source code; (b) between February 2006 and February 2007, when she was on a leave of absence for alleged medical reasons, Jin accessed Motorola's computers to obtain confidential information and trade secrets regarding various technologies, including system architecture design, ICD specifications, push-to-talk, iDen, and WiMax; (c) Jin installed Motorola's proprietary VPN access software on a Lemko-owned computer to facilitate her unauthorized access to Motorola's computers; and (d) on February 26 and 27, 2007, Jin removed additional confidential files from Motorola's computers.

Defendants Wu and Pan are married to each other. Pan is Lemko's chief technology officer. Wu worked for Motorola as an engineer from 1995 until December 2007, when Motorola terminated her. Motorola alleges that Wu and Pan engaged in improper conduct, including: (a) in October 2006, at Pan's request, Wu obtained, without authorization or in excess of her authorization, confidential log files, dump files, and other proprietary software from Motorola computers and provided this information to Pan; (b) on December 1, 2006, Wu provided Pan with access to Motorola computers containing confidential information; and (c) Wu e-mailed Pan confidential documents from Motorola's computers on May 31, 2007.

Motorola hired Bai as an engineer in 2001 and terminated his employment in December 2007. Motorola alleges that Bai, without authorization or in excess of his authorization, accessed Motorola's computers to obtain and transfer Motorola's trade secrets and other confidential information. Motorola provides several examples of this alleged conduct, including: (a) Bai e-mailed subsidy unlock codes to Wu on October 8, 2005; (b) on April 17, 2006, Bai, in response to a request by Pan, accessed Motorola's computers to obtain a subsidy unlock code and e-mailed that information to Pan; (c) Pan asked Bai for Motorola dump files relating to W-CDMA technology that Bai obtained from Motorola computers and sent to Pan on September 1, 2006; and (d) Bai e-mailed links to Pan that provided him with access to Motorola computers containing confidential information—links that an unidentified user later used on multiple occasions.

Sheng started working at Motorola in November 2006. Prior to that time she was an engineer for Lemko. Motorola alleges that Sheng secretly continued to work for and/or assist Lemko after she began her employment at Motorola, an allegation Motorola supports by a January 29, 2007 e-mail in which Sheng makes reference to helping Lemko. Motorola also discovered Lemko-associated source code on Sheng's Motorola laptop computer, as well as evidence that the laptop had been connected to a USB drive containing folders titled "Lemko." On July 1, 2008, Motorola told Sheng to report for a meeting with Motorola management the next day. Motorola terminated Sheng at that meeting. Motorola claims that before the meeting, Sheng accessed Motorola's computers and downloaded a large number of files containing confidential information to a non-secure USB drive.

This conduct forms the basis for Motorola's various claims against the defendants. Motorola also alleges, with respect to each of the defendants, that their conduct caused Motorola to incur substantial expenses in excess of $5,000 in a one-year period.

Discussion

The parties spend a substantial amount of space in their briefs seemingly arguing over whether Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007), applies to suits under the CFAA. As a decision of the Supreme Court that sets forth the standard for pleading claims in federal court, Twombly necessarily applies to this case. The Seventh Circuit has emphasized, however, that even after the Supreme Court's ruling in Twombly, federal courts continue to adhere to a notice pleading standard. E.g., Tamayo v. Blagojevich, 526 F.3d 1074, 1083-84 (7th Cir.2008). "A plaintiff must still provide only enough detail to give the defendant fair notice of what the claim is and the grounds upon which it rests ...." Id. at 1083 (quotation omitted); see also Limestone Dev. Corp. v. Village of Lemont, 520 F.3d 797, 803 (7th Cir.2008) (cautioning that Twombly should not be over-read because the Supreme Court has not required "heightened fact pleading of specifics") (quotation omitted). This requirement "simply calls for enough facts to raise a reasonable expectation that discovery will reveal evidence" of a plaintiff's claims. Twombly, 127 S.Ct. at 1965.

1. Computer Fraud and Abuse Act claims

The CFAA is primarily a criminal statute. It provides, however, for a private right of action: "Any person who suffers damage or loss by reason of a violation of this section may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief." 18 U.S.C. § 1030(g). The conduct proscribed by the statute is set forth in section 1030(a). Motorola attempts to state claims against each of the defendants under section 1030(g) for violating sections 1030(a)(2), (a)(4), and (a)(5).

a. Preliminary issues

The parties raise two preliminary matters regarding the CFAA. First, Congress recently amended several sections of the CFAA relevant to this case, effective September 2008. Motorola implies that it is appropriate to apply the current version of the CFAA, as opposed to the version of it that was operative during the course of defendants' alleged conduct. Ordinarily, absent an express statement by Congress, amendments to a statute that are substantive in nature are not applied retroactively, though procedural or jurisdictional amendments may be. See, e.g., Turkhan v. Perryman, 188 F.3d 814, 826 (7th Cir.1999) (citing Landgraf v. USI Film Prods., Inc., 511 U.S. 244, 273-75, 280, 114 S.Ct. 1483, 128 L.Ed.2d 229 (1994)). Motorola has not provided any authority or legal argument indicating that the September 2008 amendments to the CFAA were merely procedural. Accordingly, the Court will apply the terms of the CFAA as they existed during the course of defendants' alleged conduct. See TEKsystems, Inc. v. Modis, Inc., No. 08 C 5476, 2008 WL 5155720, at *1 n. 1 (N.D.Ill. Dec. 5, 2008) (applying pre-September 2008 version of the CFAA to conduct that occurred before the recent statutory amendments). Citations to the CFAA contained in this opinion will refer to the statute as it existed prior to the September 2008 amendments.

Second, Wu and Sheng contend that the heightened pleading requirement of Federal Rule of Civil Procedure 9(b) applies to Motorola's CFAA claims. As noted earlier, Motorola has asserted claims under section 1030(g) for violation of ...

To continue reading

Request your trial
63 cases
  • First Fin. Bank, N.A. v. Bauknecht
    • United States
    • U.S. District Court — Central District of Illinois
    • October 24, 2014
    ...private right of action for any person “who suffers damage or loss by reason of a [CFAA] violation.”); Motorola, Inc. v. Lemko Corp., 609 F.Supp.2d 760, 766 (N.D.Ill.2009) (construing section 1030(g) to require damage or loss rather than damage and loss). Both damage and loss are defined by......
  • In re Adegoke
    • United States
    • U.S. Bankruptcy Court — Northern District of Illinois
    • August 20, 2021
    ...to obtain compensatory damages and injunctive relief or other equitable relief." 18 U.S.C. § 1030(g) ; Motorola, Inc. v. Lemko Corp. , 609 F. Supp. 2d 760, 764 (N.D. Ill. 2009). "Thus, to recoup compensatory damages, a plaintiff must show either damage or loss." U.S. Gypsum Co. v. Lafarge N......
  • Fink v. Time Warner Cable
    • United States
    • U.S. District Court — Southern District of New York
    • September 7, 2011
    ...the statutory meaning of “damage” is limited to damage actually done “on the plaintiffs computer.” See, e.g., Motorola, Inc. v. Lemko Corp., 609 F.Supp.2d 760 (N.D.Ill.2009) (holding that disclosing trade secrets did not qualify as “damage” under the CFAA and stating that “[t]he plain langu......
  • Agilysys, Inc. v. Ken Hall & Solutions Ii, Inc., 1:16-CV-3557-ELR.
    • United States
    • U.S. District Court — Northern District of Georgia
    • May 25, 2017
    ...balance of authority, however, appears to support the view that Rule 9(b) does not apply to § 1030(a)(4)"); Motorola, Inc. v. Lemko Corp., 609 F.Supp.2d 760, 765 (N.D. Ill. 2009) (" Rule 9(b)'s requirement ... quite plainly applies to section 1030(a)(4)'s requirement that the defendant's ac......
  • Request a trial to view additional results
4 books & journal articles
  • § 7.05 The Computer Fraud and Abuse Act (18 U.S.§ 1030)
    • United States
    • Full Court Press Intellectual Property and Computer Crimes Title Chapter 7 The Computer Fraud and Abuse Act (CFAA)
    • Invalid date
    ...Rather, it alleges he disclosed USG data improperly. This does not constitute damage under the CFAA."); Motorola, Inc. v. Lemko Corp., 609 F. Supp. 2d 760, 769 (N.D. Ill. 2009) (where only harm alleged is the disclosure to a competitor of confidential information, "[t]he CFAA's definition o......
  • § 7.06 Civil Liability Under the CFAA
    • United States
    • Full Court Press Intellectual Property and Computer Crimes Title Chapter 7 The Computer Fraud and Abuse Act (CFAA)
    • Invalid date
    ...provided that civil actions may be brought for violations of subsection (a)(5)."). Seventh Circuit: Motorola, Inc. v. Lemko, Corp., 609 F. Supp. 2d 760, 766-67 (N.D. Ill. 2009) ("when section 1030(g) refers to the factors set forth in the clauses under section 1030(a)(5)(B), it does not als......
  • § 7.07 Specific Criminal Offenses and Civil Violations Under the CFAA
    • United States
    • Full Court Press Intellectual Property and Computer Crimes Title Chapter 7 The Computer Fraud and Abuse Act (CFAA)
    • Invalid date
    ...or cheat, usually for one's self or causing financial loss to another.") (internal quotation omitted); Motorola, Inc. v. Lemko Corp., 609 F. Supp. 2d 760, 765 (N.D. Ill. 2009) (heightened pleading requirement of intend to defraud "quite plainly applies to section 1030(a)(4)'s requirement th......
  • Lenity on Me: Lvrc Holdings Llc v. Brekka Points the Way Toward Defining Authorization and Solving the Split Over the Computer Fraud and Abuse Act
    • United States
    • Georgia State University College of Law Georgia State Law Reviews No. 27-2, December 2010
    • Invalid date
    ...thus, it is not clear that the authorization issue was fully presented to that court.”).See, e.g., Motorola, Inc. v. Lemko Corp., 609 F. Supp. 2d 760, 767 n.2 (N.D. Ill. 2009) (finding the defendant’s use of contrary authority “misplaced. Those courts expressly disagreed with the Seventh Ci......

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT